A revisit on the hydrogen atom induced by a uniform static electric
field
April 19, 2023
| | | |
Physics
Quantum Physics
In this paper, we revisit the Stark effect of the hydrogen atom induced by a
uniform static electric field. In particular, a general formula for the
integral of associated Laguerre polynomials was derived by applying the method
for Hermite ...
Mapping twist-tuned multiband topology in bilayer WSe2
April 19, 2023
| | | | | | |
Physics
Mesoscale and Nanoscale Physics
Strongly Correlated Electrons
Semiconductor moir\'e superlattices have been shown to host a wide array of
interaction-driven ground states. However, twisted homobilayers have been
difficult to study in the limit of large moir\'e wavelength, where interactions
are most d...
The effect of estimating prevalences on the population-wise error rate
April 19, 2023
|
Statistics
Methodology
The population-wise error rate (PWER) is a type I error rate for clinical
trials with multiple target populations. In such trials, one treatment is
tested for its efficacy in each population. The PWER is defined as the
probability that a ra...
The alternating simultaneous Halpern-Lions-Wittmann-Bauschke algorithm
for finding the best approximation pair for two disjoint intersections of
convex sets
April 19, 2023
| |
Mathematics
Computer Science
Optimization and Control
Numerical Analysis
Functional Analysis
Numerical Analysis
Given two nonempty and disjoint intersections of closed and convex subsets,
we look for a best approximation pair relative to them, i.e., a pair of points,
one in each intersection, attaining the minimum distance between the disjoint
inters...
Fast pseudorandom quantum state generators via inflationary quantum
gates
April 19, 2023
| | |
Physics
Quantum Physics
Statistical Mechanics
High Energy Physics - Theory
We propose a mechanism for reaching pseudorandom quantum states,
computationally indistinguishable from Haar random, with shallow log-n depth
quantum circuits, where n is the number of qudits. We argue that logn depth
2-qubit-gate-based...
Equalised Odds is not Equal Individual Odds: Post-processing for Group
and Individual Fairness
April 19, 2023
| | | |
Computer Science
Mathematics
Machine Learning
Computers and Society
Optimization and Control
Probability
Group fairness is achieved by equalising prediction distributions between
protected sub-populations; individual fairness requires treating similar
individuals alike. These two objectives, however, are incompatible when a
scoring model is ca...
Formality of Sphere Bundles
April 19, 2023
Mathematics
Algebraic Topology
We study the formality of orientable sphere bundles over connected compact
manifolds. When the base manifold is formal, we prove that the formality of the
bundle is equivalent to the vanishing of the Bianchi-Massey tensor introduced
by Crow...
Size-biased diffusion limits and the inclusion process
April 19, 2023
| |
Mathematics
Physics
Probability
Statistical Mechanics
Mathematical Physics
Mathematical Physics
We consider the inclusion process on the complete graph with vanishing
diffusivity, which leads to condensation of particles in the thermodynamic
limit. Describing particle configurations in terms of size-biased and
appropriately scaled emp...
On the second order of Zeta functional equations for Riemann Type
April 19, 2023
| |
Mathematics
Classical Analysis and ODEs
Functional Analysis
This paper discuss a new class of functional equations by using both Poisson
summation formula and Jacobi type theta a function. The class of Riemann type
functional equations are derived from self-reciprocal probability density
functions. ...
Deep transfer learning for intrusion detection in industrial control
networks: A comprehensive review
April 19, 2023
| |
Computer Science
Electrical Engineering and Systems Science
Cryptography and Security
Artificial Intelligence
Machine Learning
Networking and Internet Architecture
Systems and Control
Systems and Control
Globally, the external internet is increasingly being connected to industrial
control systems. As a result, there is an immediate need to protect these
networks from a variety of threats. The key infrastructure of industrial
activity can be...